Google Deploys a Fix for a Zero-Day Vulnerability Under Active Exploitation

Google Deploys a Fix for a Zero-Day Vulnerability Under Active Exploitation

Product and Affected Versions:
Product: Google Chrome browser
Affected Versions: The vulnerability affects all versions of Google Chrome prior to version 117.0.5938.132.
Severity and CVE ID:
Severity: High
CVE ID: CVE-2023-5217
Vulnerability:
The vulnerability CVE-2023-5217 is a high-severity heap-based buffer overflow in the VP8 compression format in libvpx, which is a free software video codec library developed by Google and the Alliance for Open Media (AOMedia). Heap-based buffer overflow vulnerabilities like this can potentially lead to program crashes or enable the execution of arbitrary code, posing risks to the availability and integrity of the affected software.
How the Attack Works:
The exact technical details of the exploit have not been disclosed. Generally, in heap-based buffer overflow attacks, an attacker overflows a buffer in memory, typically by inputting more data than the buffer can hold. This can lead to the attacker gaining control over the program’s execution, potentially allowing them to execute malicious code on the victim’s system.
Remediations:
Update Chrome: Upgrade to Chrome version 117.0.5938.132 or later. This version contains the fixes for the reported vulnerabilities.
Apply Updates in Chromium-based Browsers: Users of Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi should also apply the updates provided by their respective vendors when they become available. These browsers often incorporate security fixes from the Chromium project, which includes fixes for Chrome vulnerabilities.
Regular Software Updates: In general, keeping your browser and all software up to date is important for security. Regularly check for updates and apply them promptly.
Reference:
The information provided is based on the reported vulnerability CVE-2023-5217 in Google Chrome.